Warranting theory

Last updated

Within sociology, Warranting theory is a theory adapted by Joseph B. Walther and Malcolm Parks from the works of Stone. [1]

Contents

Warranting theory contends information which is immune to manipulation by the target to whom it refers is considered more valuable than information which the target has control over. The greater the potential for misrepresentation, the more likely observers are to be skeptical of the presented information. Warrants in this manner are cues that an observer uses to gauge the accuracy of a person's given information or profile.

Notable article

Walther and Parks (2002) [2] observed a phenomenon in which people met offline after having first met online. Sometimes these experiences were positive, and other times they were negative. Walther and Parks (2002) were dissatisfied with existing theories' ability to explain these phenomena. To fill in the theoretical gap, Walther and Parks (2002) adapted the original concept of warranting presented by Stone (1995), describing connections between one's self and self-presentation as a continuum rather than a binary, moderated by anonymity. They suggested that the potential for anonymity resulted in the potential for a discrepancy along this continuum. The greater this potential discrepancy, the more compelling it is for observers to be skeptical of information provided by the individual about the self (Walther & Parks, 2002). Warrants, as described by Walther and Parks (2002), are perceived reliable cues that observers use to gauge how one's true identity matches that which is presented online.

However, not all of these cues are weighted equally; rather, warrants possess a warranting value (Walther & Parks, 2002). This value is defined as the extent to which the cue is perceived to be unaltered by the target. Warrants that are very difficult to manipulate by the user are considered high in warranting value, while those that are easily changed have a low warranting value and are therefore much more questionable in terms of accuracy (Walther & Parks, 2002). For example, an article written about an individual has a higher warranting value than a social profile created by the same individual.

Walther and Parks (2002) speculated that being able to obtain information from a partner's social network would increase the warrants within an online relationship. Because information from others is of high warranting value, it stands to reason that those invested in a potential online relationship would use available resources, in this case social networks, to alleviate any skepticism about the accuracy of claims made by a relational partner.

Warrants do not necessarily have to be provided or controlled by others. Walther and Parks (2002) introduced the concept of partial warranting. This is information that, though provided by the user, contains easily verifiable facts. For example, the presentation of one's given name is a partial warrant, as this information can be used to look up public records or link to other profiles the user may possess. Providing numerical information, such as height, weight, age, or address, also constitutes as partial warranting, as these figures are easily checked and provide little room for gray area.

Existing research

Others-generated warrants

Much of the existing research regarding warranting examined how perception and judgments about an individual are influenced by others-generated information. Walther, Van Der Heide, Kim, Westerman, and Tong (2008), [3] used fake Facebook profiles to assess if the attractiveness of friends, as well as what these friends said on an individual's profile, had an effect on social attraction. Profiles that were neutral in content displayed two comments from friends. The small profile pictures of commenting friends were either attractive or unattractive, and the comments suggested either socially desirable or socially undesirable behaviors (Walther et al., 2008).

It was found that social attractiveness was positively correlated with the physical attractiveness of commenting friends (Walther et al., 2008). This indicates that the simple observable presence of others in one's social network may be enough to make social judgments. Mixed results were found regarding actual content of friend's comments (Walther et al., 2008). A significant effect was found, although these effects depended on the gender of the profile owner. This confirms the assertion in warranting theory that comments made by others do indeed warrant judgments, but adds that these judgments may be moderated by the initial claims made by the target.

This study admittedly left a gap that required further research. While it confirmed that perceptions are influenced by others, the claims made by a user were very limited and purposefully neutral (Walther et al., 2008). Therefore, the authors were unable to make assertions about the power of others-generated cues over self-generated claims. A follow-up study addressed this issue.

Walther, Van Der Heide, Hamel, and Shulman, (2009) [4] tested the effects of self-generated information against information generated by others. Walther et al. (2009) compared subjects reactions to fake Facebook profiles and their judgments of extroversion and introversion. Profiles contained either self-generated information suggesting the profile owner was introverted or extroverted, and others-generated statements suggesting the owner was introverted or extroverted. Information suggesting introversion was considered negative while information suggestion extroversion was considered to be positive. Walther et al. (2009) found that while others-generated statements do indeed have an effect on observer judgments, the effect did not override self-generated information or negativity effects.

Taking a further look at the effects of positive and negative statements with self versus others-generated information, Walther, Van Der Heide, Hamel, and Shulman (2009) replaced statements of introversion and extroversion with physical attractiveness. Subjects judged physical attractiveness of subjects based on information in the owner's profile and comments made by the owner's friends; pictures of owners were either male or female and were pre-tested to be at a neutral level of attractiveness.

Walther et al. (2009) found that when asked to make judgments of attractiveness, results were strongly in line with predictions made by warranting theory. Walther et al. (2009) explain the discrepancies in results between the two experiments by posing that perhaps more is going on when making judgments of internal versus external characteristics. It is possible that friend's judgments about personality are deemed less accurate than ones made by the person his or herself. This is likely due to the assumption that a person would know his or herself best, and may still perform activities associated with another temperament while still claiming to be the opposite; for example, a true introvert may still elect to go out with friends on occasion (Walther et al., 2009).

Social triangulation and partial warranting

Despite the introduction of partial warranting in the notable article, very little research focusing on this construct exists. Gibbs, Ellison, and Lai (2010) were the closest to studying partial warranting, or verifiable claims provided by the target, in isolation. Gibbs et al. (2010) studied warranting in the context of online dating profiles.

The study found that people in online dating situations tended to utilize web resources outside of the dating website to confirm partial warrants. For example, if a real full name was provided by a potential relational partner, users typed this information into search engines in order to retrieve public records or links to additional social-network site (SNS) profiles (Gibbs et al., 2010). This type of fact-checking was introduced as "social triangulation" (Gibbs et al., 2010). The authors speculated that this strategy would be common when "true warrants", or information uncontrolled by the user, are not available (Gibbs, et al., 2010). [5]

Deception

Since the introduction of warranting theory, two studies have examined how deceptive a person may be in terms of information they may present and the degree of verifiability of their warrants.

Parks and Archey-Ladas (2003) [6] examined a sample of 200 personal home pages, and coded the information provided by the users. To examine the data, Parks and Archey-Ladas (2003) looked at warrants (easily verified information) and constraining information (information that is not easily verified but restricts identity. Items include political activity and hobbies). Parks and Archey-Ladas (2003) found that despite the freedom afforded to users to create identities online, people quite frequently had many linkages between their online and offline lives on their personal home pages. While it is suggested by Parks and Archey-Ladas (2003) that people present verifiable information online, it is assumed that the information is honest, as Parks and Archey-Ladas did not actually follow up with an attempt to contact owners of pages. As such, this study only demonstrates people present verifiable information, but did not actually find out to what extent the present information was actually true.

Warkentin, Woodsworth, Hancock, and Cormier (2010) [7] wondered if warranting potential in a medium influenced the presence of deceptive practices. They suspected that users of online media would be more truthful if others could easily catch them in a lie. A simple correlational study was conducted in which self-report survey answers regarding deception across mediums were compared to the warranting potential of each medium (Warkentin et al., 2010).

The hypotheses were confirmed. SNSs, which were found to have the highest warranting potential, also featured the least amount of self-reported deception. Synchronous chat, which scored the lowest in warranting potential, was reported to be the largest source of deceptive practices (Warkentin et al., 2010). From this study, it appears that people have an awareness of warranting by others, and act accordingly. Because this was a correlational study, these findings could have an alternate explanation.

Parks' boundary conditions

Parks (2011) [8] presented three boundary conditions that must be present for true warranting to exist:

  1. The target must simply make a claim regarding identity.
  2. Members of the target's social network must be able to publicly comment on this claim.
  3. Observers must be able to compare the claim and comment in a meaningful way.

Warranting capacity is not medium-specific, but instead may occur anywhere where these three conditions are met. Still, it is often assumed that certain types of computer-mediated communication (CMC) lend themselves more easily to these criteria than others. For example, SNSs have been at the epicenter of studies on warranting, suggesting that they are the ideal avenue for the examination of the theory. To explore this notion, Parks (2011) used a longitudinal study to explore whether a popular SNS, Myspace, met the three requirements.

Overwhelmingly, Myspace failed to satisfy even one of the boundary conditions (Parks, 2011). Members posted very little about their identity, made few social connections, and received few to no comments on their profiles (Parks, 2011). Although it could be argued that Myspace is becoming more of a business avenue than SNSs (Parks, 2011), this study still cautions against a medium-based understanding of warranting. Instead, individual cases should be measured against qualifying criterion.

Related Research Articles

Flaming or roasting is the act of posting insults, often including profanity or other offensive language, on the internet. This term should not be confused with the term trolling, which is the act of someone going online, or in person, and causing discord. Flaming emerged from the anonymity that Internet forums provide cover for users to act more aggressively. Anonymity can lead to disinhibition, which results in the swearing, offensive, and hostile language characteristic of flaming. Lack of social cues, less accountability of face-to-face communications, textual mediation and deindividualization are also likely factors. Deliberate flaming is carried out by individuals known as flamers, which are specifically motivated to incite flaming. These users specialize in flaming and target specific aspects of a controversial conversation.

An internet relationship is a relationship between people who have met online, and in many cases know each other only via the Internet. Online relationships are similar in many ways to pen pal relationships. This relationship can be romantic, platonic, or even based on business affairs. An internet relationship is generally sustained for a certain amount of time before being titled a relationship, just as in-person relationships. The major difference here is that an internet relationship is sustained via computer or online service, and the individuals in the relationship may or may not ever meet each other in person. Otherwise, the term is quite broad and can include relationships based upon text, video, audio, or even virtual character. This relationship can be between people in different regions, different countries, different sides of the world, or even people who reside in the same area but do not communicate in person.

Impression management is a conscious or subconscious process in which people attempt to influence the perceptions of other people about a person, object or event by regulating and controlling information in social interaction. It was first conceptualized by Erving Goffman in 1959 in The Presentation of Self in Everyday Life, and then was expanded upon in 1967.

In media studies, mass communication, media psychology, communication theory, and sociology, media influence and media effects are topics relating to mass media and media culture's effects on individual or an audience's thoughts, attitudes, and behavior. Whether it is written, televised, or spoken, mass media reaches a large audience. Mass media's role and effect in shaping modern culture are central issues for study of culture.

Elaboration likelihood model Dual process theory

The elaboration likelihood model (ELM) of persuasion is a dual process theory describing the change of attitudes. The ELM was developed by Richard E. Petty and John Cacioppo in 1980. The model aims to explain different ways of processing stimuli, why they are used, and their outcomes on attitude change. The ELM proposes two major routes to persuasion: the central route and the peripheral route.

Media richness theory, sometimes referred to as information richness theory or MRT, is a framework used to describe a communication medium's ability to reproduce the information sent over it. It was introduced by Richard L. Daft and Robert H. Lengel in 1986 as an extension of information processing theory. MRT is used to rank and evaluate the richness of certain communication media, such as phone calls, video conferencing, and email. For example, a phone call cannot reproduce visual social cues such as gestures which makes it a less rich communication media than video conferencing, which affords the transmission of gestures and body language. Based on contingency theory and information processing theory, MRT theorizes that richer, personal communication media are generally more effective for communicating equivocal issues in contrast with leaner, less rich media.

The uncertainty reduction theory, also known as initial interaction theory, developed in 1975 by Charles Berger and Richard Calabrese, is a communication theory from the post-positivist tradition. It is one of the few communication theories that specifically looks into the initial interaction between people prior to the actual communication process. The theory asserts the notion that, when interacting, people need information about the other party in order to reduce their uncertainty. In gaining this information people are able to predict the other's behavior and resulting actions, all of which according to the theory is crucial in the development of any relationship.

Parasocial interaction Psychological relationship between audiences and celebrity personas through mass media

Parasocial interaction (PSI) refers to a kind of psychological relationship experienced by an audience in their mediated encounters with performers in the mass media, particularly on television and on online platforms. Viewers or listeners come to consider media personalities as friends, despite having no or limited interactions with them. PSI is described as an illusionary experience, such that media audiences interact with personas as if they are engaged in a reciprocal relationship with them. The term was coined by Donald Horton and Richard Wohl in 1956.

Media psychology is the branch and specialty field in psychology that focuses on the interaction of human behavior with media and technology. Media psychology is not limited to mass media or media content; it includes all forms of mediated communication and media technology-related behaviors, such as the use, design, impact, and sharing behaviors. This branch is a relatively new field of study because of advancement in technology. It uses various methods of critical analysis and investigation to develop a working model of a user's perception of media experience. These methods are used for society as a whole and on an individual basis. Media psychologists are able to perform activities that include consulting, design, and production in various media like television, video games, films, and news broadcasting. Media psychologists are not considered to be those who are featured in media, rather than those who research, work or contribute to the field.

The social penetration theory (SPT) proposes that as relationships develop, interpersonal communication moves from relatively shallow, non-intimate levels to deeper, more intimate ones. The theory was formulated by psychologists Irwin Altman of the University of Utah and Dalmas Taylor of the University of Delaware in 1973 to understand relationship development between individuals. Altman and Taylor noted that relationships "involve different levels of intimacy of exchange or degree of social penetration". SPT is known as an objective theory as opposed to an interpretive theory, which means it is based on data drawn from experiments and not from conclusions based on individuals' specific experiences.

Interpersonal deception theory (IDT) is one of a number of theories that attempts to explain how individuals handle actual deception at the conscious or subconscious level while engaged in face-to-face communication. The theory was put forth by David Buller and Judee Burgoon in 1996 to explore this idea that deception is an engaging process between receiver and deceiver. IDT assumes that communication is not static; it is influenced by personal goals and the meaning of the interaction as it unfolds. The sender's overt communications are affected by the overt and covert communications of the receiver, and vice versa.

Social information processing (theory)

Social information processing theory, also known as SIP, is an interpersonal communication theory and media studies theory developed in 1992 by Joseph Walther. Social information processing theory explains online interpersonal communication without nonverbal cues and how people develop and manage relationships in a computer-mediated environment. Walther argued that online interpersonal relationships may demonstrate the same or even greater relational dimensions and qualities (intimacy) as traditional FtF relationships. However, due to the limited channel and information, it may take longer to achieve than FtF relationships. These online relationships may help facilitate interactions that would not have occurred face-to-face due to factors such as geography and intergroup anxiety.

The hyperpersonal model is a model of interpersonal communication that suggests computer-mediated communication (CMC) can become hyperpersonal because it "exceeds [face-to-face] interaction", thus affording message senders a host of communicative advantages over traditional face-to-face (FtF) interaction. The hyperpersonal model demonstrates how individuals communicate uniquely, while representing themselves to others, how others interpret them, and how the interactions create a reciprocal spiral of FtF communication. Compared to ordinary FtF situations, a hyperpersonal message sender has a greater ability to strategically develop and edit self-presentation, enabling a selective and optimized presentation of one's self to others.

Social interactions in MMORPGS take the form of in-game communication, virtual behaviors, and the development of interpersonal and group relationships. In massive multiplayer online role-playing games (MMORPGs), cooperation between players to accomplish difficult tasks is often an integral mechanic of gameplay, and organized groups of players, often called guilds, clans, or factions, emerge. Sometimes the relationships players from within the game spill over into friendships or romantic relationships in the material world. In other instances, romantic partners and groups of material world friends find that playing together strengthens their bonds.

Social presence theory explores how the "sense of being with another" is influenced by digital interfaces in human-computer interactions. Developed from the foundations of interpersonal communication and symbolic interactionism, social presence theory was first formally introduced by John Short, Ederyn Williams, and Bruce Christie in The Social Psychology of Telecommunications. Research on social presence theory has recently developed to examine the efficacy of telecommunications media, including SNS communications. The theory notes that computer-based communication is lower in social presence than face-to-face communication, but different computer-based communications can affect the levels of social presence between communicators and receivers.

Gender differences in social network service use Differences between genders with regard to use of social media and social network service

Men and women use social network services (SNSs) differently and with different frequencies. In general, several researchers have found that women tend to use SNSs more than men and for different and more social purposes.

Joseph B. Walther is the Mark and Susan Bertelsen Presidential Chair in Technology and Society and the Director of the Center for Information Technology & Society at the University of California, Santa Barbara. His research focuses on social and interpersonal dynamics of computer-mediated communication, in groups, personal relationships, organizational and educational settings. He is noted for creating social information processing theory in 1992 and the hyperpersonal model in 1996.

Nonverbal influence is the act of affecting or inspiring change in others' behaviors and attitudes by way of tone of voice or body language and other cues like facial expression. This act of getting others to embrace or resist new attitudes can be achieved with or without the use of spoken language. It is a subtopic of nonverbal communication. Many individuals instinctively associate persuasion with verbal messages. Nonverbal influence emphasizes the persuasive power and influence of nonverbal communication. Nonverbal influence includes appeals to attraction, similarity and intimacy.

Lada Adamic American network scientist

Lada Adamic is an American network scientist, who researches information dynamics in networks. She studies how network structure influences the flow of information, how information influences the evolution of networks, and crowdsourced knowledge sharing.

Privacy settings are "the part of a social networking website, internet browser, piece of software, etc. that allows you to control who sees information about you". With the growing prevalence of social networking services, opportunities for privacy exposures also grows. Privacy settings allow a person to control what information is shared on these platforms.

References

  1. Stone, A. R. (1995). The war of desire and technology at the close of the mechanical age. Cambridge, MA: MIT Press.
  2. Walther, Joseph; Malcolm Parks (2002). "Cues filtered out, cues filtered in: Computer-mediated communication and relationships". Handbook of Interpersonal Communication. 3rd edition: 529–563.
  3. Walther, Joseph; Van Der Heide; Kim; Westerman; Tong (January 2008). "The Role of Friends' Appearance and Behavior on Evaluations of Individuals on Facebook: Are We Known by the Company We Keep?". Human Communication Research. 34 (1): 28. doi:10.1111/j.1468-2958.2007.00312.x.
  4. Walther, Joseph; Brandon Van Der Heide; Lauren M. Hamel; Hillary C. Shulman (2009-01-28). "Self-Generated Versus Other-Generated Statements and Impressions in Computer-Mediated Communication A Test of Warranting Theory Using Facebook". Communication Research. 36 (2): 229–253. doi:10.1177/0093650208330251.
  5. Gibbs, Jennifer; Nicole B. Ellison; Chih-Hui Lai (February 2011). "First Comes Love, Then Comes Google: An Investigation of Uncertainty Reduction Strategies and Self-Disclosure in Online Dating". Communication Research. 38 (1): 70–100. doi:10.1177/0093650210377091.
  6. Parks, Malcolm; Tonjia Archy-Ladas (2003). "Communicating self through personal homepages: Is identity more than screen deep?". ICA Conference Paper. Retrieved 24 April 2012.
  7. Warkentin, Darcy; Michael Woodworth; Jeffrey Hancock; Nicole Cormier (2012). "Warrants and deception in computer mediated communication" (PDF). CSCW. Retrieved 24 April 2012.
  8. Parks, Malcolm (August 4, 2011). "Boundary Conditions for the Application of Three Theories of Computer-Mediated Communication to MySpace". Journal of Communication. 61 (4): 557–574. doi:10.1111/j.1460-2466.2011.01569.x.

Sources